I. Introduction
Online scams have become one of the most common forms of fraud in the Philippines. They may occur through social media, messaging apps, e-commerce platforms, fake investment schemes, phishing emails, mobile wallets, online banking, job offers, romance scams, impersonation, or fake government assistance programs. Because money can be transferred instantly and scammers can hide behind fake identities, victims often feel that recovery is difficult. Nevertheless, Philippine law provides several remedies, reporting channels, and preservation measures that may help victims pursue criminal, civil, administrative, or platform-based action.
This article explains, in the Philippine context, how an online scam may be reported, what laws may apply, what evidence should be preserved, which agencies may be approached, what to expect after reporting, and what practical steps a victim should take immediately after discovering the scam.
This is general legal information and not a substitute for advice from a Philippine lawyer, law enforcement officer, prosecutor, bank officer, or regulator handling the specific case.
II. What Counts as an Online Scam?
An online scam is a deceptive act committed through the internet, telecommunications, electronic platforms, or digital payment systems to obtain money, property, personal information, account access, or some other benefit from the victim.
Common examples include:
Fake online selling A seller advertises goods or services online, receives payment, and fails to deliver.
Investment scams A person or group promises high returns, guaranteed profits, crypto earnings, forex profits, “double your money” schemes, or referral-based income without legitimate authority.
Phishing A scammer sends a fake link, email, SMS, or message pretending to be a bank, e-wallet provider, delivery company, government agency, or known company to steal passwords, OTPs, or account details.
Identity theft or impersonation A scammer uses another person’s name, photo, account, business identity, or official-looking profile to deceive others.
Romance scams A scammer pretends to have a romantic relationship with the victim and eventually asks for money, gifts, emergency funds, travel money, or investment funds.
Employment or recruitment scams A fake recruiter asks for placement fees, processing fees, medical fees, training payments, or document fees for a job that does not exist.
Loan scams A fake lender asks for advance fees, “unlocking fees,” insurance, collateral deposits, or processing charges before releasing a loan that is never given.
Fake charity or emergency assistance scams A scammer pretends to collect donations for medical emergencies, calamity victims, or social causes.
Account takeover scams The scammer gains control of a victim’s social media, email, bank, or e-wallet account and uses it to solicit money from contacts.
Marketplace and delivery scams These include fake proof of payment, fake couriers, fake escrow services, overpayment scams, or “cash-on-delivery” manipulation.
III. Relevant Philippine Laws
Several Philippine laws may apply depending on the facts.
A. Revised Penal Code: Estafa
Many online scams fall under estafa, which generally involves defrauding another person through deceit, abuse of confidence, or fraudulent means. In an online selling scam, for example, estafa may be alleged when the scammer misrepresented that goods existed or would be delivered, induced payment, and then failed to deliver because the transaction was fraudulent from the beginning.
The amount involved may affect the penalty, but even small-value scams may still be reported.
B. Cybercrime Prevention Act of 2012
The Cybercrime Prevention Act of 2012 is important because it recognizes crimes committed through information and communications technology. If fraud is committed using a computer system, social media account, email, mobile application, website, or electronic platform, cybercrime provisions may become relevant.
The law also punishes cyber-related offenses such as illegal access, identity theft, computer-related fraud, computer-related forgery, and misuse of devices, depending on the circumstances.
Where a traditional crime like estafa is committed using ICT, authorities may treat the case as involving cybercrime elements.
C. Access Devices Regulation Act
If the scam involves credit cards, debit cards, ATM cards, online banking credentials, e-wallet credentials, account numbers, OTPs, or unauthorized use of access devices, the Access Devices Regulation Act may be relevant.
This may apply to card fraud, account takeover, stolen credentials, unauthorized transactions, and similar schemes.
D. Data Privacy Act
If the scam involves unauthorized collection, use, disclosure, sale, or misuse of personal information, the Data Privacy Act may be relevant. This is especially important in phishing, identity theft, doxxing, fake accounts, leaked IDs, SIM registration misuse, or unauthorized processing of sensitive personal information.
The National Privacy Commission may become relevant where the issue involves personal data misuse or a data breach.
E. Consumer Protection and E-Commerce Rules
If the scam occurred in connection with online selling, goods, services, e-commerce, misleading advertisements, or unfair sales practices, consumer protection rules may also apply. Complaints may be directed to appropriate consumer protection agencies depending on the transaction.
F. Securities Regulation Laws
If the scam involves investment solicitation, securities, crypto-style investments, pooled funds, trading schemes, lending schemes, or promises of passive income, the Securities and Exchange Commission may be relevant. Entities soliciting investments from the public generally need proper authority.
A so-called “investment opportunity” may be suspicious if it promises unusually high returns, guaranteed profits, pressure to recruit others, or no clear business model.
G. Anti-Money Laundering Considerations
Where funds are transferred through banks, e-wallets, remittance centers, cryptocurrency platforms, or payment processors, financial institutions may have anti-money laundering obligations. The victim should promptly report the transaction to the bank or e-wallet provider so the institution can review, freeze, hold, trace, or escalate the transaction where legally possible.
IV. Immediate Steps After Discovering an Online Scam
A victim should act quickly. Delay may make it harder to preserve evidence, trace funds, or stop further losses.
1. Stop Communicating Except to Preserve Evidence
Do not continue sending money. Do not negotiate further if the scammer asks for more fees to “release” goods, funds, winnings, loans, or investments. Scammers often ask for repeated payments under different labels.
Preserve the conversation before blocking the scammer. Blocking too early may remove access to messages or profile details.
2. Take Screenshots and Screen Recordings
Capture everything relevant, including:
- Profile name, username, display name, account link, page URL, group name, phone number, email address, or website;
- Conversation history;
- Payment instructions;
- Proof of payment;
- QR codes;
- Bank account or e-wallet details;
- Advertisements or posts;
- Receipts;
- Tracking numbers;
- Fake IDs or documents sent by the scammer;
- Promises, representations, and deadlines;
- Threats or demands;
- Any proof that the scammer received the money.
Screenshots should include dates, times, names, URLs, and visible identifiers as much as possible.
3. Save Original Files
Aside from screenshots, save original files where possible:
- Email files;
- Receipts;
- PDF invoices;
- Images;
- Videos;
- Voice notes;
- SMS messages;
- Call logs;
- Downloaded webpages;
- Transaction confirmations.
Original files can preserve metadata that may be useful later.
4. Do Not Delete Messages
Do not delete chats, emails, SMS messages, transaction confirmations, call logs, or app notifications. If the scam occurred on a platform, exported chat logs may be useful.
5. Contact the Bank, E-Wallet, or Payment Provider Immediately
Report the transaction to the bank, e-wallet, remittance service, or payment platform used. Ask whether they can:
- Hold or freeze the transfer;
- Reverse or recall the transaction;
- Block the recipient account;
- File an internal fraud report;
- Issue a transaction reference number;
- Provide official transaction records;
- Escalate the matter to their fraud or compliance team.
For unauthorized banking or e-wallet transactions, immediate reporting is especially important.
6. Change Passwords and Secure Accounts
If the scam involved phishing, account takeover, suspicious links, or leaked credentials:
- Change passwords immediately;
- Enable two-factor authentication;
- Log out of all devices;
- Remove unknown devices or sessions;
- Change email passwords first, because email often controls password resets;
- Contact the platform to recover or secure the account;
- Warn contacts if the account was used to solicit money.
7. Report the Scam to the Platform
Report the account, page, post, group, listing, ad, or website to the platform. This may help remove the scammer and preserve platform records.
Examples include reports to Facebook, Messenger, Instagram, TikTok, X, Telegram, WhatsApp, Viber, Shopee, Lazada, Carousell, job platforms, or payment apps.
8. Prepare a Chronology
Write a clear timeline while the facts are fresh. Include:
- When and how the scammer contacted you;
- What was promised;
- What persuaded you to pay;
- How much was paid;
- Where the payment was sent;
- What happened after payment;
- Whether the scammer disappeared, blocked you, delayed, threatened you, or asked for more money.
A concise chronology helps police, prosecutors, banks, lawyers, and regulators understand the case.
V. Where to Report an Online Scam in the Philippines
Depending on the nature of the scam, the victim may report to one or more of the following.
A. Philippine National Police Anti-Cybercrime Group
The PNP Anti-Cybercrime Group handles cybercrime complaints, including online fraud, identity theft, hacking, phishing, cyber libel, and other internet-related offenses.
A victim may approach the PNP ACG or a local police station for assistance. If the complaint involves online fraud, electronic evidence, fake accounts, or digital transactions, the cybercrime unit is usually relevant.
What to bring:
- Valid government-issued ID;
- Printed and digital copies of evidence;
- Screenshots of conversations and profiles;
- Transaction receipts;
- Bank or e-wallet account details used by the scammer;
- Links or URLs;
- Phone numbers and email addresses;
- Written chronology;
- Affidavit or sworn statement, if requested.
B. National Bureau of Investigation Cybercrime Division
The NBI Cybercrime Division also receives cybercrime complaints. Victims may file complaints involving online scams, phishing, identity theft, hacking, fake accounts, or online extortion.
The NBI may request a written complaint, identification, evidence, and an affidavit.
C. Local Police Station
A victim may also report to the nearest police station. The local police can make a blotter entry, assist with initial documentation, and refer the matter to the appropriate cybercrime unit.
A police blotter alone is not the same as a criminal conviction or full prosecution, but it is useful as a formal record that the incident was reported.
D. City or Provincial Prosecutor’s Office
For criminal prosecution, a complaint may eventually be filed with the prosecutor’s office for preliminary investigation, especially where the scammer is identified. The complaint usually requires:
- Complaint-affidavit;
- Supporting affidavits;
- Evidence;
- Identification documents;
- Details showing deceit, damage, and participation of the respondent.
The prosecutor determines whether there is probable cause to file the case in court.
E. Bank, E-Wallet, or Financial Institution
This is one of the first places to report if money was transferred. Victims should report to both:
- Their own bank or e-wallet provider; and
- The recipient bank or e-wallet provider, if known.
The report should include transaction reference numbers, date and time, amount, recipient name or account number, and a short explanation that the transfer was induced by fraud.
F. Securities and Exchange Commission
Report to the SEC if the scam involves:
- Investment solicitation;
- Guaranteed returns;
- Crypto investment pooling;
- Forex trading schemes;
- Lending investment schemes;
- Ponzi-style or referral-based schemes;
- Unregistered securities;
- Corporations or associations soliciting funds without authority.
The SEC may issue advisories, investigate entities, and coordinate with law enforcement.
G. Department of Trade and Industry
The DTI may be relevant for consumer complaints involving online sellers, businesses, misleading sales practices, defective products, non-delivery, or unfair trade practices.
However, if the seller is purely fake or anonymous and the facts show fraud from the beginning, law enforcement may also be needed.
H. National Privacy Commission
Report to the NPC if the scam involves misuse of personal data, unauthorized disclosure, identity theft involving personal information, fake accounts using personal data, or possible data breach.
The NPC may be relevant where the concern is not only the money lost but also the unlawful processing or exposure of personal information.
I. E-Commerce Platform or Marketplace
If the transaction occurred through an online marketplace, use the platform’s complaint, refund, dispute, or seller-report process. Some platforms have buyer protection policies, escrow systems, or internal fraud teams.
Act quickly because platforms often impose deadlines for disputes.
J. Telecommunications Provider
If the scam involved a mobile number, SMS phishing, or calls, report the number to the telecom provider. The telco may block or investigate numbers subject to its procedures and applicable law.
VI. Evidence Needed for Reporting
A strong complaint depends on complete, organized evidence. The following are commonly useful.
A. Identity and Contact Evidence
- Scammer’s name or alias;
- Username;
- Profile URL;
- Page or group link;
- Mobile number;
- Email address;
- Bank account name;
- E-wallet name;
- Account number;
- QR code;
- Photos or documents used by the scammer.
B. Communication Evidence
- Full chat history;
- Emails;
- SMS messages;
- Voice notes;
- Call logs;
- Screenshots of promises or representations;
- Messages showing payment instructions;
- Messages showing excuses, threats, blocking, or refusal to refund.
C. Transaction Evidence
- Deposit slips;
- Bank transfer receipts;
- E-wallet receipts;
- Remittance receipts;
- Credit card statements;
- Transaction reference numbers;
- Account numbers;
- Date and time of transfer;
- Amount transferred.
D. Online Presence Evidence
- Website links;
- Marketplace listings;
- Social media posts;
- Advertisements;
- Group posts;
- Comments from other victims;
- Domain information, where available;
- Screenshots showing the scammer’s representations.
E. Damage Evidence
- Total amount lost;
- Additional fees paid;
- Lost goods or services;
- Unauthorized transactions;
- Harm to reputation;
- Loss caused by identity theft;
- Emotional distress, where relevant;
- Business losses, where documented.
VII. How to Prepare a Complaint-Affidavit
A complaint-affidavit is a sworn written statement narrating the facts. It may be required by police, NBI, or prosecutors.
It should generally contain:
Personal details of the complainant Name, age, address, occupation, contact details, and proof of identity.
Details of the respondent Name, alias, username, phone number, email, address, account number, or any available identifier.
Narration of facts Explain what happened in chronological order.
False representations State what the scammer claimed, promised, advertised, or represented.
Reliance Explain why you believed the scammer and why you sent money or information.
Payment or loss State the amount, date, method, account details, and proof of payment.
Failure, disappearance, or refusal Explain what happened after payment.
Evidence Attach screenshots, receipts, messages, URLs, and other documents.
Prayer or request Request investigation and filing of appropriate charges.
Verification and notarization The affidavit may need to be signed under oath before a notary public or authorized officer.
VIII. Sample Structure of a Complaint Narrative
A complaint may be organized as follows:
I am filing this complaint for online scam/fraud committed against me through [platform]. On [date], I saw a post/listing/message from [name/username] offering [item/service/investment/job/loan]. The respondent represented that [specific promise]. Because of these representations, I sent the amount of PHP [amount] to [bank/e-wallet/account name/account number] on [date and time], as shown by the attached proof of payment.
After payment, the respondent [failed to deliver/blocked me/gave excuses/asked for more money/refused refund]. I later discovered that [facts showing fraud, such as fake account, other victims, false tracking number, non-existent business, unauthorized investment solicitation].
I respectfully request the appropriate authorities to investigate this matter and file the necessary charges against the responsible person or persons.
IX. Reporting to Banks and E-Wallets
Where funds were sent through banks or e-wallets, speed matters. The victim should immediately contact customer support, fraud hotline, app support, or branch personnel.
The report should include:
- Account holder’s name;
- Victim’s account number or wallet number;
- Recipient’s account number or wallet number;
- Amount;
- Date and time of transfer;
- Reference number;
- Screenshots of scam conversation;
- Police or NBI report, if already available.
The victim should ask for a case or ticket number.
Banks and e-wallets may not always reverse transfers, especially if the funds were already withdrawn or moved. However, timely reporting increases the chance of account freezing, investigation, or coordination with law enforcement.
X. Reporting Phishing and Unauthorized Transactions
If the victim clicked a link, gave an OTP, entered login credentials, installed an app, scanned a QR code, or allowed remote access, the case may involve phishing or account compromise.
Immediate actions:
- Call the bank or e-wallet fraud hotline.
- Request account freezing or temporary blocking.
- Change passwords.
- Disable compromised cards or accounts.
- Check all linked accounts.
- Report unauthorized transactions.
- File a cybercrime complaint.
- Preserve phishing links, SMS messages, emails, sender details, and website screenshots.
Victims should not share OTPs, passwords, PINs, CVVs, recovery codes, or screen-sharing access with anyone claiming to be from a bank, government agency, courier, or platform.
XI. Reporting Investment Scams
Investment scams are common in the Philippines and often use phrases such as:
- Guaranteed income;
- No risk;
- Daily payout;
- Double your money;
- Passive income;
- Crypto mining;
- Trading bot;
- Forex pool;
- Slot investment;
- Tasking investment;
- Referral bonus;
- Limited slots;
- “SEC registered” without actual authority to solicit investments.
A corporation being registered with the SEC does not automatically mean it is authorized to solicit investments from the public. Registration as a corporation is different from authority to offer securities or investment contracts.
For investment scams, victims should gather:
- Investment contract;
- Screenshots of promised returns;
- Proof of deposit;
- Names of recruiters;
- Group chat messages;
- SEC registration claims;
- Marketing materials;
- Payout records;
- Referral structures;
- Bank or wallet accounts used.
Reports may be made to law enforcement and the SEC.
XII. Reporting Fake Online Sellers
For fake sellers, preserve:
- Product listing;
- Seller profile;
- Chat history;
- Proof of payment;
- Delivery promises;
- Tracking numbers;
- Seller’s account details;
- Any refusal to refund;
- Screenshots showing the item was advertised.
The victim may report to:
- The platform or marketplace;
- Bank or e-wallet provider;
- PNP ACG or NBI Cybercrime Division;
- DTI, where a consumer transaction with a business is involved;
- Local police for blotter and assistance.
A key issue is whether the seller merely failed to perform a contract or intended to defraud from the start. Evidence of fake identity, repeated victims, immediate blocking, false tracking numbers, refusal to communicate, or non-existent goods may support a fraud complaint.
XIII. Reporting Romance Scams
Romance scams often involve emotional manipulation. The scammer may claim to be abroad, in the military, a foreign professional, a seafarer, a widower, or someone needing emergency help.
Common excuses include:
- Medical emergency;
- Customs fees;
- Parcel release fees;
- Travel expenses;
- Visa fees;
- Business problems;
- Frozen account;
- Family emergency.
Victims should preserve romantic messages, money requests, photos, video call records, account names, transfer receipts, and any fake documents.
Romance scam victims are often embarrassed, but reporting is important because the same scammer may be targeting many people.
XIV. Reporting Job and Recruitment Scams
A job scam may involve fake employers, fake agencies, work-from-home schemes, online tasking, or overseas job offers.
Warning signs include:
- Payment required before hiring;
- Fees for interviews, training, equipment, medical exams, visas, or processing;
- Salary too high for vague work;
- No verifiable company;
- Communication only through messaging apps;
- Fake employment contracts;
- Requests for IDs and bank details.
Reports may be made to law enforcement. If overseas recruitment is involved, labor and migration authorities may also become relevant. Victims should preserve job posts, contracts, recruiter identities, payment records, and conversations.
XV. Reporting Identity Theft or Fake Accounts
If someone uses your name, photos, ID, business name, or account to scam others:
- Report the fake account to the platform.
- Warn friends, customers, or the public.
- Preserve screenshots of the fake account.
- File a cybercrime complaint.
- Report misuse of personal data to the NPC where appropriate.
- Secure your own accounts.
- Ask affected persons to preserve messages from the impersonator.
If your account was hacked, report both the hacking and the fraudulent use of the account.
XVI. Reporting Scams Involving SIM Cards and Mobile Numbers
If the scammer used a mobile number, preserve:
- SMS messages;
- Call logs;
- Mobile number;
- Screenshots of messages;
- Payment requests;
- Links sent;
- Voice recordings, if lawfully obtained;
- The date and time of calls or messages.
Report to law enforcement and, where appropriate, the telecommunications provider. The SIM registration framework may assist authorities, but victims generally cannot personally demand disclosure of subscriber information without lawful process.
XVII. What Happens After Reporting?
The process varies depending on the agency and facts, but it may involve:
Initial assessment Authorities review whether the facts show a possible crime.
Evidence evaluation Investigators examine screenshots, transaction records, accounts, links, and identities.
Affidavit preparation The complainant may be asked to execute a sworn statement.
Coordination with banks, platforms, or telcos Law enforcement may request records through proper legal channels.
Identification of suspect The scammer may be identified through account records, transaction trails, IP logs, KYC documents, phone numbers, or witness information.
Referral for preliminary investigation If sufficient evidence exists, the case may be referred to the prosecutor.
Preliminary investigation The prosecutor determines probable cause.
Court case If probable cause is found, an information may be filed in court.
Possible restitution or civil claim Recovery of money may be pursued through criminal restitution, settlement, civil action, or other remedies, depending on the case.
XVIII. Can the Money Be Recovered?
Recovery is possible in some cases but not guaranteed. It depends on:
- How quickly the report was made;
- Whether the funds remain in the recipient account;
- Whether the bank or wallet can freeze or trace funds;
- Whether the scammer used verified accounts;
- Whether the scammer is located in the Philippines;
- Whether the scammer can be identified;
- Whether multiple transfers were made;
- Whether the platform has buyer protection;
- Whether a civil or criminal case succeeds.
Victims should not pay “recovery agents” who promise to get funds back for an advance fee. Many recovery offers are also scams.
XIX. Criminal, Civil, and Administrative Remedies
A. Criminal Complaint
A criminal complaint seeks investigation and prosecution of the offender. Possible offenses may include estafa, computer-related fraud, identity theft, unauthorized access, or other crimes depending on the facts.
B. Civil Action
A victim may pursue civil remedies to recover money or damages. In some situations, the civil action is impliedly instituted with the criminal action unless reserved or separately filed. Legal advice is important in deciding strategy.
C. Administrative or Regulatory Complaint
If the scam involves a regulated entity, business, platform, financial institution, lending company, investment solicitor, or personal data controller, administrative complaints may be available before agencies such as the SEC, DTI, NPC, or relevant financial regulators.
D. Platform Dispute
A platform complaint may result in refund, account suspension, listing removal, buyer protection, or preservation of records. This is separate from criminal reporting.
XX. Jurisdiction and Venue Issues
Online scams often involve different locations:
- The victim may be in one city;
- The scammer may be in another province or country;
- The bank account may be registered elsewhere;
- The platform may be foreign-based;
- The server may be outside the Philippines.
Philippine authorities may still receive the complaint where the victim is located or where an element of the offense occurred. For practical purposes, victims usually start with their local police, PNP ACG, NBI Cybercrime Division, or the appropriate agency.
For foreign scammers, investigation may be more difficult, but reports are still useful for records, account blocking, financial tracing, and possible international cooperation.
XXI. Preserving Digital Evidence Properly
Digital evidence can be challenged if incomplete, altered, or unclear. Victims should:
- Keep original devices when possible;
- Avoid editing screenshots except for making copies;
- Save full conversation threads;
- Preserve URLs;
- Record dates and times;
- Save transaction receipts in original format;
- Export chats where available;
- Keep emails with full headers where possible;
- Back up evidence in cloud and physical storage;
- Print copies for filing but also keep digital originals.
Screenshots should not be the only evidence where original messages, emails, or transaction records can be preserved.
XXII. Common Mistakes Victims Should Avoid
Sending more money Scammers often invent new fees after the first payment.
Deleting conversations Deleted chats may weaken the complaint.
Posting accusations without care Public accusations may expose the victim to defamation or cyber libel claims if statements are inaccurate or excessive. Reports to authorities are safer.
Relying only on social media shaming Public posts may warn others, but they do not replace formal reporting.
Failing to report to the bank quickly Delay may allow funds to be withdrawn.
Paying recovery scammers Fake hackers and recovery agents often victimize scam victims again.
Not securing accounts If credentials were compromised, further losses may occur.
Assuming small losses are not reportable Even small scams may be part of a larger operation.
Not organizing evidence Investigators need clear documentation.
Ignoring personal data exposure If IDs, selfies, signatures, addresses, or bank details were shared, identity theft risk should be addressed.
XXIII. Practical Checklist for Victims
Within the first hour
- Stop sending money.
- Screenshot the scammer’s profile, posts, messages, and payment instructions.
- Save proof of payment.
- Contact the bank or e-wallet provider.
- Change passwords if credentials were shared.
- Enable two-factor authentication.
- Report the account or listing to the platform.
Within the same day
- Prepare a written timeline.
- Gather all evidence in one folder.
- Report to PNP ACG, NBI Cybercrime Division, or local police.
- Report to the platform, telco, bank, or e-wallet provider.
- Warn contacts if your account was hacked or impersonated.
Within the following days
- Execute a complaint-affidavit if required.
- Follow up with the bank or e-wallet provider.
- File complaints with SEC, DTI, NPC, or other agencies if applicable.
- Consult a lawyer for significant losses, identified suspects, business-related scams, or complex evidence.
- Monitor accounts and credit or financial activity.
XXIV. What to Include in a Report
A good report should answer the following:
- Who is the victim?
- Who is the suspected scammer?
- What was promised or represented?
- When did the transaction happen?
- Where did the communication happen?
- How was payment made?
- How much was lost?
- What account received the money?
- What happened after payment?
- What evidence supports the complaint?
- What action is being requested?
The report should be factual, chronological, and supported by attachments.
XXV. Sample Evidence Index
Victims may attach an evidence index like this:
| Exhibit | Description |
|---|---|
| A | Screenshot of seller’s profile/page |
| B | Screenshot of product listing or investment offer |
| C | Chat messages showing representations |
| D | Chat messages showing payment instructions |
| E | Proof of payment or transfer receipt |
| F | Screenshot of recipient bank/e-wallet details |
| G | Messages after payment showing excuses/refusal |
| H | Screenshot showing account blocked or deleted |
| I | Bank/e-wallet complaint ticket |
| J | Police blotter or initial report |
This makes the complaint easier to review.
XXVI. Special Concerns for Businesses
Businesses that are scammed online should preserve additional records:
- Purchase orders;
- Invoices;
- Delivery documents;
- Corporate emails;
- Employee communications;
- Vendor accreditation records;
- Bank authorization logs;
- Internal approvals;
- Accounting entries;
- CCTV or access logs, if relevant.
For business email compromise, immediately notify banks, counterparties, IT personnel, and law enforcement. Change email credentials, review forwarding rules, inspect compromised accounts, and preserve headers of fraudulent emails.
XXVII. Special Concerns for Minors and Students
If the victim is a minor, a parent or guardian should assist in reporting. If the scam involves sexual exploitation, blackmail, intimate images, grooming, or threats, the matter should be treated urgently and reported to law enforcement. Do not pay blackmailers. Preserve evidence and seek immediate assistance from trusted adults and authorities.
XXVIII. Online Scam Prevention
While reporting is important, prevention remains essential.
Basic safeguards include:
- Verify seller identity before paying.
- Avoid advance payments to strangers.
- Use platform escrow or buyer protection where available.
- Do not share OTPs, PINs, passwords, CVVs, or recovery codes.
- Check whether investment entities are authorized.
- Be suspicious of guaranteed high returns.
- Avoid clicking links from unsolicited messages.
- Check URLs carefully.
- Use strong passwords and two-factor authentication.
- Do not install unknown apps or remote access tools.
- Verify job offers through official company channels.
- Confirm requests for money through a separate trusted channel.
- Be careful with public posts showing IDs, tickets, addresses, or financial details.
XXIX. Key Legal Points to Remember
- An online scam may be both a traditional fraud offense and a cybercrime-related offense.
- Evidence must be preserved immediately.
- The bank or e-wallet provider should be contacted as soon as possible.
- Reports may be filed with PNP ACG, NBI Cybercrime Division, local police, prosecutors, and relevant regulators.
- A complaint-affidavit should be factual, chronological, and supported by documents.
- Recovery of money is possible but not guaranteed.
- Investment scams should be reported not only to law enforcement but also to the SEC.
- Personal data misuse may justify reporting to the NPC.
- Consumer-related online transactions may involve DTI or platform dispute mechanisms.
- Victims should avoid paying additional money to scammers or fake recovery agents.
XXX. Conclusion
Reporting an online scam in the Philippines requires fast action, careful evidence preservation, and filing with the proper authorities or institutions. The victim should immediately secure accounts, preserve messages and receipts, notify banks or e-wallets, report the scammer to the platform, and file a complaint with law enforcement such as the PNP Anti-Cybercrime Group, the NBI Cybercrime Division, or the local police. Depending on the nature of the scam, the victim may also report to the SEC, DTI, NPC, financial institutions, telecommunications providers, or the relevant online marketplace.
The strongest reports are those supported by complete screenshots, transaction records, account details, URLs, a clear chronology, and a sworn statement. While not every case results in immediate recovery, formal reporting helps create an official record, supports investigation, may prevent further victimization, and preserves the victim’s legal remedies under Philippine law.